{"api_version":"1","generated_at":"2026-05-06T10:27:25+00:00","cve":"CVE-2021-4292","urls":{"html":"https://cve.report/CVE-2021-4292","api":"https://cve.report/api/cve/CVE-2021-4292.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-4292","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-4292"},"summary":{"title":"CVE-2021-4292","description":"A vulnerability was found in OpenMRS Admin UI Module up to 1.4.x. It has been rated as problematic. This issue affects some unknown processing of the file omod/src/main/webapp/pages/metadata/privileges/privilege.gsp of the component Manage Privilege Page. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 1.5.0 is able to address this issue. The name of the patch is 4f8565425b7c74128dec9ca46dfbb9a3c1c24911. It is recommended to upgrade the affected component. The identifier VDB-216917 was assigned to this vulnerability.","state":"PUBLIC","assigner":"cna@vuldb.com","published_at":"2022-12-27 23:15:00","updated_at":"2023-11-07 03:40:00"},"problem_types":["CWE-79"],"metrics":[],"references":[{"url":"https://vuldb.com/?ctiid.216917","name":"https://vuldb.com/?ctiid.216917","refsource":"MISC","tags":[],"title":"CVE-2021-4292 | OpenMRS Admin UI Module Manage Privilege Page privilege.gsp cross site scripting (ID 58)","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/openmrs/openmrs-module-adminui/releases/tag/1.5.0","name":"https://github.com/openmrs/openmrs-module-adminui/releases/tag/1.5.0","refsource":"MISC","tags":[],"title":"Release 1.5.0 · openmrs/openmrs-module-adminui · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://vuldb.com/?id.216917","name":"https://vuldb.com/?id.216917","refsource":"MISC","tags":[],"title":"CVE-2021-4292 | OpenMRS Admin UI Module Manage Privilege Page privilege.gsp cross site scripting (ID 58)","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/openmrs/openmrs-module-adminui/commit/4f8565425b7c74128dec9ca46dfbb9a3c1c24911","name":"https://github.com/openmrs/openmrs-module-adminui/commit/4f8565425b7c74128dec9ca46dfbb9a3c1c24911","refsource":"MISC","tags":[],"title":"Merge pull request #58 from jmmacdo4/master · openmrs/openmrs-module-adminui@4f85654 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/openmrs/openmrs-module-adminui/pull/58","name":"https://github.com/openmrs/openmrs-module-adminui/pull/58","refsource":"MISC","tags":[],"title":"EMPT-74. Fix XSS vulnerability on the manage privilege page  by jmmacdo4 · Pull Request #58 · openmrs/openmrs-module-adminui · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-4292","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-4292","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"4292","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openmrs","cpe5":"admin_ui_module","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2021-4292","ASSIGNER":"cna@vuldb.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"A vulnerability was found in OpenMRS Admin UI Module up to 1.4.x. It has been rated as problematic. This issue affects some unknown processing of the file omod/src/main/webapp/pages/metadata/privileges/privilege.gsp of the component Manage Privilege Page. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 1.5.0 is able to address this issue. The name of the patch is 4f8565425b7c74128dec9ca46dfbb9a3c1c24911. It is recommended to upgrade the affected component. The identifier VDB-216917 was assigned to this vulnerability."},{"lang":"deu","value":"Eine Schwachstelle wurde in OpenMRS Admin UI Module bis 1.4.x ausgemacht. Sie wurde als problematisch eingestuft. Dies betrifft einen unbekannten Teil der Datei omod/src/main/webapp/pages/metadata/privileges/privilege.gsp der Komponente Manage Privilege Page. Durch Manipulieren mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Ein Aktualisieren auf die Version 1.5.0 vermag dieses Problem zu lösen. Der Patch wird als 4f8565425b7c74128dec9ca46dfbb9a3c1c24911 bezeichnet. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-79 Cross Site Scripting","cweId":"CWE-79"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"OpenMRS","product":{"product_data":[{"product_name":"Admin UI Module","version":{"version_data":[{"version_value":"1.0","version_affected":"="},{"version_value":"1.1","version_affected":"="},{"version_value":"1.2","version_affected":"="},{"version_value":"1.3","version_affected":"="},{"version_value":"1.4","version_affected":"="}]}}]}}]}},"references":{"reference_data":[{"url":"https://github.com/openmrs/openmrs-module-adminui/releases/tag/1.5.0","refsource":"MISC","name":"https://github.com/openmrs/openmrs-module-adminui/releases/tag/1.5.0"},{"url":"https://vuldb.com/?id.216917","refsource":"MISC","name":"https://vuldb.com/?id.216917"},{"url":"https://vuldb.com/?ctiid.216917","refsource":"MISC","name":"https://vuldb.com/?ctiid.216917"},{"url":"https://github.com/openmrs/openmrs-module-adminui/pull/58","refsource":"MISC","name":"https://github.com/openmrs/openmrs-module-adminui/pull/58"},{"url":"https://github.com/openmrs/openmrs-module-adminui/commit/4f8565425b7c74128dec9ca46dfbb9a3c1c24911","refsource":"MISC","name":"https://github.com/openmrs/openmrs-module-adminui/commit/4f8565425b7c74128dec9ca46dfbb9a3c1c24911"}]},"impact":{"cvss":[{"version":"3.1","baseScore":3.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"},{"version":"3.0","baseScore":3.5,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}]}},"nvd":{"publishedDate":"2022-12-27 23:15:00","lastModifiedDate":"2023-11-07 03:40:00","problem_types":["CWE-79"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":6.1,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":2.7}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openmrs:admin_ui_module:*:*:*:*:*:*:*:*","versionEndExcluding":"1.5.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}